SSOAR Logo
    • Deutsch
    • English
  • Deutsch 
    • Deutsch
    • English
  • Einloggen
SSOAR ▼
  • Home
  • Über SSOAR
  • Leitlinien
  • Veröffentlichen auf SSOAR
  • Kooperieren mit SSOAR
    • Kooperationsmodelle
    • Ablieferungswege und Formate
    • Projekte
  • Kooperationspartner
    • Informationen zu Kooperationspartnern
  • Informationen
    • Möglichkeiten für den Grünen Weg
    • Vergabe von Nutzungslizenzen
    • Informationsmaterial zum Download
  • Betriebskonzept
Browsen und suchen Dokument hinzufügen OAI-PMH-Schnittstelle
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Volltext herunterladen

(externe Quelle)

Zitationshinweis

Bitte beziehen Sie sich beim Zitieren dieses Dokumentes immer auf folgenden Persistent Identifier (PID):
https://doi.org/10.22178/pos.113-2

Export für Ihre Literaturverwaltung

Bibtex-Export
Endnote-Export

Statistiken anzeigen
Weiterempfehlen
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

Adoption of Zero Trust Architecture (ZTA) in the Protection of Critical Infrastructure

[Zeitschriftenartikel]

Ojo, Abraham Olasunkanmi

Abstract

Securing critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, has become a pressing concern in the face of increasingly sophisticated cyber threats. These essential systems underpin modern society, and disruptions to their operations can have severe econ... mehr

Securing critical infrastructure (CI), including energy, healthcare, transportation, and financial systems, has become a pressing concern in the face of increasingly sophisticated cyber threats. These essential systems underpin modern society, and disruptions to their operations can have severe economic, social, and safety consequences. Traditional perimeter-based cybersecurity approaches have proven insufficient against evolving attack vectors, highlighting the need for more resilient strategies such as Zero Trust Architecture (ZTA). Zero Trust Architecture represents a paradigm shift in cybersecurity, advocating "never trust, always verify." Unlike legacy models, ZTA emphasises continuous authentication, least privilege access, and network micro-segmentation to mitigate external and internal threats. By assuming that breaches are inevitable, ZTA enforces stringent access controls and real-time monitoring to safeguard critical systems. This review examines the adoption of ZTA in the protection of critical infrastructure.Key findings showed the benefits of ZTA, including enhanced resilience against cyberattacks and improved regulatory compliance. The paper also discusses challenges such as integration with legacy systems, resource constraints, and organisational resistance. Recommendations are provided to guide the phased implementation of ZTA and promote cross-sector collaboration to secure critical infrastructure effectively.... weniger

Klassifikation
Recht

Freie Schlagwörter
critical infrastructure; cyberattacks; legacy model; Zero Trust Architecture

Sprache Dokument
Englisch

Publikationsjahr
2025

Seitenangabe
S. 5001-5009

Zeitschriftentitel
Path of Science, 11 (2025) 1

ISSN
2413-9009

Status
Veröffentlichungsversion; begutachtet (peer reviewed)

Lizenz
Creative Commons - Namensnennung 4.0


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.